249
Comments (30)
sorted by:
22
upvote 22 points ago +23 / -1

NSA =/= a national security source.

1
deleted 1 point ago +1 / -0
-1
i5ogjdfioj934 -1 points ago +3 / -4

Sure it is. A source confirmed it.

And I'm told that a senior official, who spoke on the condition of anonymity, has independently verified it.

6
deleted 6 points ago +7 / -1
2
ScrewReddit 2 points ago +2 / -0

I'm pretty the parent comment was sarcasm.

4
doucheyllama 4 points ago +5 / -1

Multiple anonymous sources, who are familiar with the thinking of the people involved, confirmed our suspicions as well.

9
nomoremasks 9 points ago +9 / -0

are you sure you understand the tweets before you repost them?

6
deleted 6 points ago +6 / -0
3
Trumper007 3 points ago +3 / -0

lol

6
deleted 6 points ago +6 / -0
2
Tokens_Worth 2 points ago +2 / -0

Welcome to the show fren

1
deleted 1 point ago +1 / -0
4
rtravisf 4 points ago +4 / -0

national security source could be anything shit half of the liberal reporters are whatever they choose to be any given day.

3
letrain 3 points ago +3 / -0

Wasn't is said that "E" was there when this happened.

4
kek_saved_the_world [S] 4 points ago +4 / -0

E is Watnick as straight up MAGA Killer

3
letrain 3 points ago +3 / -0

And Q is flynn.

2
MyNewToy 2 points ago +3 / -1

This also explains the Bar and Haspel meetings with cocaine Mitch

2
NoSoMo_ThanU 2 points ago +2 / -0

NSA is under the NatSec umbrella, but natsec is not NSA. Everyone from DHS to DOD is natsec.

2
doucheyllama 2 points ago +2 / -0

Ah yes, they got the keyboard used in the crime

2
DJT2020 2 points ago +2 / -0

The pieces of the puzzle are coming into alignment.

1
FollowTheLight 1 point ago +1 / -0

A piece of hardware? An Alpenhorn?

1
deleted 1 point ago +1 / -0
1
testingonetwothree 1 point ago +1 / -0

Can a tech savvy person explain to me what kind of information would be stored? Couldn't plenty of votes be altered while the machines are not connected to the internet thus making data records obsolete? Or would such changes be somehow encoded and later recorded if/when they connect to the internet?

2
NetscapeNavigator 2 points ago +2 / -0

Computers, especially servers, often record a tremendous amount of data about actions performed that can be uncovered by digital forensics experts. It's not all-encompassing and the level of detail can be turned up and down, but the controls for exactly what is recorded when and where are not fully understood by most typical administrators.

As for what they may look for, database transaction logs, firewall logs, crash dumps, snapshots, and any scripts or custom binaries would be the primary targets. This information could reveal manual data manipulation outside of coded behavior, connection origins for where data came from and was sent to, and bugs or intentional malevolent code. Deeper forensics could reveal tremendous information about administrative actions performed going right back to when the system was originally set up.

There is an adversarial relationship with complexity though. Bigger environments are more likely to hold more logging data for longer, but forensic pieces will be more spread out as single actions can touch thousands of servers. What constitutes a "server" can get fuzzy as the layers of abstraction deepen through virtualization, containerization, and orchestration. Transient data that is useful for forensics can be rapidly overwritten and fully destroyed as physical servers are given more roles and shared between customers. The haystack can become very big, very fast while the needle stays exactly the same size. At the scale of Amazon, Microsoft, and Google, cooperation with the environment's operators becomes explicitly necessary to make meaningful discoveries.

TL;DR, we can't know in advance. There could be a smoking gun, there could be nothing but scrambled data, there could be data that leads us to look elsewhere but is useless alone, and so on. It's worse than a box of chocolates, because much of what could be found inside depends upon the skill of who is looking.

2
testingonetwothree 2 points ago +2 / -0

Thank you for the in-depth explanation. I heard some machines used flashdrives to transfer votes to some type of official record keeping computer. I wonder if that would completely conceal a lot of corruption. Hopefully we find out I guess...

2
NetscapeNavigator 2 points ago +2 / -0

The transfer media itself isn't as important as the anti-tamper mechanisms used. If Dominion used hardware-based key attestation to sign results files and the central system only accepted a single tabulation file with a valid signature from each known system with multi-party sign-offs on missing results, that's probably a security measure they'd be proud of and would advertise. It's not bulletproof alone by far, but would help raise the bar by a good measure.

Given they don't, it's probably a shitty .csv file that anybody with hands-on can edit. That's the kind of system the lowest bidder will build and can only be "disproven" with a full hand recount of paper ballots.

I say this as someone who spends way too much personal and professional time working with computers and finds them unendingly fascinating: electronic equipment more complicated than a printing calculator has no business in any election.

1
deleted 1 point ago +1 / -0
1
pithys 1 point ago +1 / -0

Well apparently there is a server that counts the votes. That is where all the votes are sent to be added up. Presumably that is where the algorithm would run before being sent to the public database used by news networks. If they have this server, they could look at the logs to see the incoming data and see if it adds up to the outgoing data.

1
deleted 1 point ago +1 / -0